Let’s begin Information Security by classifying an Organization’s Data in order to identify which Data requires Protection. The Overall Process includes the following steps: Identify and Classify Sensitive Data Assets …
Data Security – CRUD or CRUDE Matrix
A CRUD or CRUDE matrix is a useful way to capture and display activities and permissions within a system. You can use a CRUD matrix to observe how Processes handle …
ISMS – ISO/IEC-27001:2013 – Annex A
What Is ISO/IEC 27001:2013 and Why Does It Matter in Information Security ISO/IEC-27001:2013 is the International Security Standard and Best Practice Guidelines, which details the requirements for an ISMS, for …
Data Security in Data Management
Defining Data Security in Information Management Rule of Thumb: CIA Triad – Confidentiality, Integrity, and Availability. Data Security includes the planning, development, and execution of security policies and procedures to …
Data Masking – Data Subsetting
Key Data Masking Techniques for Privacy Protection Data Masking is the process of replacing, truncating, scrambling, or encrypting sensitive data with fictitious yet realistic-looking data. Data Mask limits sensitive data …
Data-Driven Approach and Data-Driven Organization
Understanding the Data Driven Approach in Business Strategy A data-driven approach says to make strategic decisions based on facts rather than opinions. Decisions become smarter if it is based on …
Organization / Enterprise Ontology and Taxonomy
Understanding Organization Ontology and Enterprise Taxonomy With the growing amount of information created every day, effective Data Management is a key business requirement for Data-Driven organizations as a part of …
Data Modeling – Conceptual, Logical and Physical Model – CDM, LDM and PDM
What is Data Modeling? Data Modeling is the process of creating an illustrative and visual representation of either a whole information/database system or parts of it to show the relationships …